vulnerability
Ubuntu: (Multiple Advisories) (CVE-2022-1729): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:S/C:C/I:C/A:C) | May 20, 2022 | Aug 11, 2022 | Aug 18, 2025 |
Severity
7
CVSS
(AV:L/AC:M/Au:S/C:C/I:C/A:C)
Published
May 20, 2022
Added
Aug 11, 2022
Modified
Aug 18, 2025
Description
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
Solutions
ubuntu-upgrade-linux-image-4-15-0-1051-dell300xubuntu-upgrade-linux-image-4-15-0-1104-oracleubuntu-upgrade-linux-image-4-15-0-1117-raspi2ubuntu-upgrade-linux-image-4-15-0-1125-kvmubuntu-upgrade-linux-image-4-15-0-1134-gcpubuntu-upgrade-linux-image-4-15-0-1135-snapdragonubuntu-upgrade-linux-image-4-15-0-1139-awsubuntu-upgrade-linux-image-4-15-0-1139-aws-hweubuntu-upgrade-linux-image-4-15-0-1149-azureubuntu-upgrade-linux-image-4-15-0-191-genericubuntu-upgrade-linux-image-4-15-0-191-generic-lpaeubuntu-upgrade-linux-image-4-15-0-191-lowlatencyubuntu-upgrade-linux-image-4-4-0-1113-awsubuntu-upgrade-linux-image-4-4-0-1114-kvmubuntu-upgrade-linux-image-4-4-0-1151-awsubuntu-upgrade-linux-image-4-4-0-234-genericubuntu-upgrade-linux-image-4-4-0-234-lowlatencyubuntu-upgrade-linux-image-5-15-0-1002-gkeopubuntu-upgrade-linux-image-5-15-0-1013-ibmubuntu-upgrade-linux-image-5-15-0-1014-raspiubuntu-upgrade-linux-image-5-15-0-1014-raspi-nolpaeubuntu-upgrade-linux-image-5-15-0-1015-gkeubuntu-upgrade-linux-image-5-15-0-1015-intel-iotgubuntu-upgrade-linux-image-5-15-0-1017-gcpubuntu-upgrade-linux-image-5-15-0-1017-kvmubuntu-upgrade-linux-image-5-15-0-1017-oracleubuntu-upgrade-linux-image-5-15-0-1019-awsubuntu-upgrade-linux-image-5-15-0-1019-azureubuntu-upgrade-linux-image-5-15-0-47-genericubuntu-upgrade-linux-image-5-15-0-47-generic-64kubuntu-upgrade-linux-image-5-15-0-47-generic-lpaeubuntu-upgrade-linux-image-5-15-0-47-lowlatencyubuntu-upgrade-linux-image-5-15-0-47-lowlatency-64kubuntu-upgrade-linux-image-5-15-0-48-genericubuntu-upgrade-linux-image-5-15-0-48-generic-64kubuntu-upgrade-linux-image-5-15-0-48-generic-lpaeubuntu-upgrade-linux-image-5-15-0-48-lowlatencyubuntu-upgrade-linux-image-5-15-0-48-lowlatency-64kubuntu-upgrade-linux-image-5-4-0-1033-ibmubuntu-upgrade-linux-image-5-4-0-1046-bluefieldubuntu-upgrade-linux-image-5-4-0-1053-gkeopubuntu-upgrade-linux-image-5-4-0-1070-raspiubuntu-upgrade-linux-image-5-4-0-1075-kvmubuntu-upgrade-linux-image-5-4-0-1083-gkeubuntu-upgrade-linux-image-5-4-0-1083-oracleubuntu-upgrade-linux-image-5-4-0-1085-awsubuntu-upgrade-linux-image-5-4-0-1089-gcpubuntu-upgrade-linux-image-5-4-0-1091-azureubuntu-upgrade-linux-image-5-4-0-1091-azure-fdeubuntu-upgrade-linux-image-5-4-0-126-genericubuntu-upgrade-linux-image-5-4-0-126-generic-lpaeubuntu-upgrade-linux-image-5-4-0-126-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-dell300xubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-64k-hwe-22-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-22-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-18-04ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lpae-hwe-22-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gke-5-4ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-15ubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-hwe-22-04ubuntu-upgrade-linux-image-virtual-lts-xenial
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.